Quiz: Chapter 3 - Computers in Business Assessment

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

It's always a good idea to check the ________ before clicking Reply to All.

list of addresses

Be careful to only open e-mail from senders you know and trust. ________ may be contained in e-mail messages.

malware

Sometimes used in smaller business networks, employee ________ software is impractical for large networks because of the number of users and the potential for misuse.

monitoring

Though legal, which of the following would likely be prohibited by a typical business computer-use policy?

online personal shopping

Software that gives network administrators the ability to provide computer assistance from a central location by allowing them to display and control any computer on the network is called ________ software.

remote desktop

Business owners, copyright holders, and network administrators publish ________ so that users understand what is expected and permissible when they use the network, computer equipment, and/or software.

AUP's

Which category of management information systems (MIS) focuses on providing forecasting capabilities for sales and production?

DSS

When referring to business information technology, MIS stands for ________.

Management information systems

Which category of management information systems (MIS) focuses on tracking sales and inventories?

TPS

Errors in data occurring while entering, reading, processing, storing or transmitting is known as data ________.

corruption

Collecting data, interpreting information gleaned from a database, and preparing reports for senior management are tasks that are typically assigned to a(n) ________.

data analyst

Stealing confidential materials such as copyrighted material, confidential information, or company e-mails from a network is called ________. Most often, this crime is committed by employees inside the company rather than outside hackers.

data theft

Monitoring database systems performance, developing and maintaining databases, and establishing user privileges for databases are usual roles of a(n) ________.

database administrator (DBA)

In the body of a professionally formatted business e-mail, where should a request be placed?

in the first sentence of the body of your e-mail

The role of installing, maintaining, repairing and replacing information system hardware and software typically falls to the ________.

information systems (information technology) technician

Visiting pornography sites while using a company computer and/or network violates your company's computer-use policy. You've signed a policy that requires you to report any computer ethics violations to your boss. You observe a co-worker visiting porn sites at work and determine that you should report this activity. Other co-workers also noticed this violation. You should

tell your boss that you've witnessed the co-worker visiting porn sites while using the company computer or network.

Along with the From line, what is the most important factor in ensuring your business message is read?

the subject line

Using information systems to help foresee corporate business opportunities and threats that might be done by all levels of management, but it is most important for which management level?

top-level managers

A form of E-mail fraud where criminals change the account where money is being transferred is called a(n) ________ scam.

wire-wire

Intrusion Detection Systems (IDS) use several techniques to protect networks. One is called a "halt", which stops the hacker from progressing into the network. Another is called a(n) ________, which closes the access point used by the hacker.

block


Ensembles d'études connexes

Strength and Conditioning Final study guide

View Set

General Characteristics of Molds

View Set

What are three types of muscle in the body

View Set

PSYCH CHAPTER 7 PRE AND POST TEST QUESTIONS AND NCLEX

View Set

Checkpoint 1 - Chemistry 8.4 Sedimentary rocks

View Set